2-2 Final Project Milestone One- Introduction
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
659
Subject
Finance
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by CoachField7138
1
2-2 Final Project Milestone One: Introduction
Myriah Iles
SNHU
Dr. Derek Holbert
November 20
th
, 2022
2
Introduction
For our final project in this course, we have been tasked with creating an information
technology incident report. The information technology report that I have chosen to create is based on Twitter, a social media platform/e-communication entity. In July 2020, Twitter fell victim to a massive spearfishing attack in which the attackers were able to obtain the credentials of Twitter’s remote workers. Once the credentials were stolen, they were used to wreak havoc on
Twitter’s users, administrators, and the organization as a whole (ITP.Net, 2020).
3
Introduction: Application of Cyber Principles
Information technology law, or cyberlaw, is the branch of law pertaining to the internet and computers. This branch of law can be considered newer in its creation with its birth coming to within the twenty-first century along side the explosive utilization of the internet, computers, and wireless technology (Information technology law [cyberlaw], 2022). Cyberlaw essentially deals with the internet, encompassing cases, statutes, regulations, and disputes that affect individuals and businesses interacting through the utilization of computers or computer devices (Craig, 2010). Cyberlaw itself encompasses law and security principles which include: conducting risk assessments, implementing and information security system, creating a cyber risk management policy(ies), managing third party vendors, providing employees with routine cyber security training(s), and implementing an incident or threat reporting program.
Introduction: Summary of Case
The incident that I have chosen to report on is the Twitter breach which occurred in July of 2020. Twitter is one of the top social media/ e-communication platforms which is a publicly traded technology company worth approximately $37 billion. The platform itself has over 330 million total monthly active users and over 186 million active daily users, thus making it a powerhouse in how we communicate and receive information. During this incident, a group of hackers breached Twitter’s network by spear-phishing Twitter’s remote workers, gaining their
trust, and obtaining their credentials. Once those credentials were received, the attackers gained control of twitter accounts utilized by high-profile users such as Elon Musk, Barack Obama, Kim
Kardashian, Jeff Bezos, and other politicians, cryptocurrency companies, celebrities, and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
entrepreneurs. Once the accounts were taken over, they tweeted spam under the moniker of “double your bitcoin”. In monetary value, the hackers were able to obtain more than $118,000 worth of bitcoin. Social media has become near essential in today’s world for communications, business efforts, and news media efforts. This incident’s occurrence happening, to such a large entity, amplifies the importance of a strong cybersecurity presence within social media platforms. The lack of a strong cyber security presence can prove to be detrimental to not only the organization, but also to society as a whole (Twitter investigation report, 2020).
5
References
Craig, B. (2012). Cyberlaw: The Law of the Internet and Information Technology. [MBS Direct].
Retrieved from https://mbsdirect.vitalsource.com/#/books/9780133072860/
Information technology law (cyberlaw). (2022). Salem Press Encyclopedia.
ITP.Net. 2020. “We Reveal the Biggest Data Breaches of 2020,” September 13. https://search-
ebscohost-
com.ezproxy.snhu.edu/login.aspx?direct=true&db=edsbig&AN=edsbig.A635286673
&site=eds-live&scope=site.
Twitter investigation report. Department of Financial Services. (2020, October 14). Retrieved November 20, 2022, from https://www.dfs.ny.gov/Twitter_Report
Related Documents
Related Questions
Please Solve In 20mins
arrow_forward
Data breach 2024 Vans Data Breach Fujistu Data Breach Bank of America Data Breach Anthropic
Data Leak Trello Data Breach 2023 Norton Healthcare Data Breach Vanderbilt University Medical
Center Data Breach Toronto Public Library Data Breach Infosys Data Breach Indian Council of
Medical Research Data Breach Okta Data Breach Air Europa Data Breach 23andMe Data Breach
Help me find peer reviewed articles for above any one or two data breach. Thank you.
arrow_forward
financial management ch 15 hw
please show work.
question 10
(EBIT-EPS analysis) Three recent graduates of the computer science program at the University of Tennessee are forming a company that will write and distribute new application software for the iPhone. Initially, the corporation will operate in the southern region of Tennessee, Georgia, North Carolina, and South Carolina. A small group of private investors in the Atlanta, Georgia area is interested in financing the startup company and two financing plans have been put forth for consideration:
• The first (Plan A) is an all-common-equity capital structure.
$2.5 million dollars would be raised by selling common stock at $20 per common share.
• Plan B would involve the use of financial leverage.
$1.1 million dollars would be raised by selling bonds with an effective interest rate of 10.6
percent (per annum), and the remaining $1.4 million would be raised by selling common stock at the $20 price per share.…
arrow_forward
ACC340
Chapter 16, Problem 16-11, on page 641: Discuss how emerging technologies, such as the Internet, affect the GL/ BR process. In what ways will organizations have to adapt their business processes to reflect the changes in these external factors?
arrow_forward
explain how offen a firm that expects to need funds during the coming year might make sure the needed funds will be avaliable
arrow_forward
Don't use ai to answer I will report your answer Solve it Asap with explanation and calculation
arrow_forward
Q24
Fast Wire Incorporated manufactures a scrambling device for cellular phones. The main component of the scrambling device is a very delicate part—DTV-12. DTV-12 requires careful handlings during manufacturing. Once damaged, the part must be discarded. Only skilled laborers are hired to manufacture and install DTV-12. Damages still occur, however. The following are the operating data of Fast Wire Incorporated for 2021 and 2022 relative to the insertion of DTV-12.
2021
2022
Number of phones manufactured
606,000
730,000
Units of DTV-12 used
960,300
1,000,000
Direct labor hours for DTV-12 insertion
1,850
2,655
Total cost of DTV-12 units
$ 1,444,000
$ 2,334,000
Direct labor wage rate per hour
$ 68.50
$ 84
The partial operational productivity ratio of DTV-12 in 2022 is:
Multiple Choice
3.00 per unit.
0.73 per unit.
0.63 per unit.
3.33 per unit.
1.92 per unit.
arrow_forward
So, if
Question 7
Question 8
Question 9
Question content area top
Part 1
(Related to Checkpoint 13.3) (Scenario analysis) Family Security is considering introducing tiny GPS trackers that can be inserted in the sole of a child's shoe, which would then allow for the tracking of that child if he or she was ever lost or abducted. The estimates, that might be off by
10
percent (either above or below), associated with this new product are shown here:
LOADING...
.
Since this is a new product line, you are not confident in your estimates and would like to know how well you will fare if your estimates on the items listed above are
10
percent higher or
10
percent lower than expected. Assume that this new product line will require an initial outlay of
$1.00
million, with no working capital investment, and will last for
10
years, being depreciated down to zero using straight-line depreciation. In addition, the firm's required rate of return or cost of capital is…
arrow_forward
Question #4
"The higher the minimum desired rate of return, the higher the price that a company will be
willing to pay for cost-saving equipment." Do you agree? Explain.
Respond
Responses for this topic are hidden from you until you make a response.
P Pearson
Copyright© 2021 Pearson Education Inc. All rights reserved.I Terms of Use I Privacy Policy I Permissions I Contact Us
rch
233 PM
ENG
4/20/2021
"brt sc
delete
home
end
backspace
num
lock
P.
っ]
home
4
enter
pause
↑ shift
end
HP Pavilion
Powerful laptop.
Thin and light design.
arrow_forward
Q4 ChatGPT
wwwwwwwwwww
i. What can generative AI applications perform?
ii. What are the tools for Generative AI?
iii. You are required to design a logo for your system of the AIS project based on the following
1. Use ChatGPT or similar tools to generate a prompt that describes the details of the logo
2. Input the prompt into an image generator and generate 4 different versions of the logo.
arrow_forward
QUESTION 4
What is the best way to familiarize yourself with the effectiveness, timing, and appropriateness of your research methodology?
O pilot testing
O read previous research
O watch youtube videos to see how long the measurements take
O ask an expert
arrow_forward
Please Solve In 15mins
I will Thumbs-up promise
arrow_forward
Could really use some help with this problem on Wileyplus
arrow_forward
SUBJECT FIN 4610
PLEASE MAKE THIS BUSINESS PROPSOAL INTODUCTION MORE APEEALING AND MORE IN BREAKING IT DOWN FURTHER TO BE MORE THAN A PAGE AND MAKE SURE THERE IS NO AI DETECTED AS MORE IS BEING ADDED TO WHAT I ALREADY HAVE AND FIXING THE GRAMMAR:
Uber's Entry into Micro-Mobility using e-bikes and scooters proposal
INTRODUCTION:
Uber is the largest ride share transportation method that connect passengers with different drivers to arrive to their location safely through an app on their smartphones. Travis Kalanick and Garrett Camp founded Uber in 2008 after having trouble finding a taxi which was a major issue that wasn’t being priorities and has been a growing company for years now and later on launched an app in 2009 to make it more accessible and has been consistently expanding its services to include food delivery package delivery freight transportation and more to continue being successful and having a good reputation on the long…
arrow_forward
ngageNOWv2 | Online teachin x
Chapter 4 Corporate Financial Ac x +
/ilm/takeAssignment/takeAssignmentMain.do?invoker=&takeAssignmentSession Locator=&inprogress=false
☆
E
1 Welcome - Login.gov
Sign in to your acco...
Control Center
Part 9:
The following is a comprehensive problem which encompasses all of the elements learned in previous chapters. You can refer to the objectives for each chapter covered as a review of the
concepts.
Note: You must complete parts 1, 2, 3, 4, 6, 7 and 8 before completing part 9. Part 5 is optional.
Part 9: Prepare the closing entries below. Then, using the attached spreadsheet from part 2, post the entries to your general ledger. If an amount box does not require an entry, leave it blank.
Date
Account Name
Post. Ref.
Debit
Credit
20Y8 Closing Entries
May 31 Fees Earned
40,000 ✓
0
✓
1,705 ✓
0✔
0✓
1,600 ✔
0 ✓
1,370 ✔
0✓
330
0✔
275
✓
1,295 ✔
33,425 ✔
0
10,500
<
Previous
Next
Email Instructor Save and Exit Submit Assignment for Gradin
10:53 PE
--
6/13/202
WIS
V…
arrow_forward
Preventing Cybercrime and Identity Theft
Cybercrime and identity theft have become a growing problem in all aspects of society in recent years. Locate an article about cybercrime or identity theft in an organization from one of the types we have discussed in the course (government, not-for-profit organization, healthcare organization, or college or university). Summarize the case of cybercrime or identity theft in your article. What are the risks of these types of crimes to their organization? How can auditing and internal controls help prevent a company from falling prey to cybercrime?
Then, review the examples shared by your peers. What strategies related to auditing and internal controls could you suggest for the organizations they shared?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L

Financial Reporting, Financial Statement Analysis...
Finance
ISBN:9781285190907
Author:James M. Wahlen, Stephen P. Baginski, Mark Bradshaw
Publisher:Cengage Learning
Related Questions
- Please Solve In 20minsarrow_forwardData breach 2024 Vans Data Breach Fujistu Data Breach Bank of America Data Breach Anthropic Data Leak Trello Data Breach 2023 Norton Healthcare Data Breach Vanderbilt University Medical Center Data Breach Toronto Public Library Data Breach Infosys Data Breach Indian Council of Medical Research Data Breach Okta Data Breach Air Europa Data Breach 23andMe Data Breach Help me find peer reviewed articles for above any one or two data breach. Thank you.arrow_forwardfinancial management ch 15 hw please show work. question 10 (EBIT-EPS analysis) Three recent graduates of the computer science program at the University of Tennessee are forming a company that will write and distribute new application software for the iPhone. Initially, the corporation will operate in the southern region of Tennessee, Georgia, North Carolina, and South Carolina. A small group of private investors in the Atlanta, Georgia area is interested in financing the startup company and two financing plans have been put forth for consideration: • The first (Plan A) is an all-common-equity capital structure. $2.5 million dollars would be raised by selling common stock at $20 per common share. • Plan B would involve the use of financial leverage. $1.1 million dollars would be raised by selling bonds with an effective interest rate of 10.6 percent (per annum), and the remaining $1.4 million would be raised by selling common stock at the $20 price per share.…arrow_forward
- ACC340 Chapter 16, Problem 16-11, on page 641: Discuss how emerging technologies, such as the Internet, affect the GL/ BR process. In what ways will organizations have to adapt their business processes to reflect the changes in these external factors?arrow_forwardexplain how offen a firm that expects to need funds during the coming year might make sure the needed funds will be avaliablearrow_forwardDon't use ai to answer I will report your answer Solve it Asap with explanation and calculationarrow_forward
- Q24 Fast Wire Incorporated manufactures a scrambling device for cellular phones. The main component of the scrambling device is a very delicate part—DTV-12. DTV-12 requires careful handlings during manufacturing. Once damaged, the part must be discarded. Only skilled laborers are hired to manufacture and install DTV-12. Damages still occur, however. The following are the operating data of Fast Wire Incorporated for 2021 and 2022 relative to the insertion of DTV-12. 2021 2022 Number of phones manufactured 606,000 730,000 Units of DTV-12 used 960,300 1,000,000 Direct labor hours for DTV-12 insertion 1,850 2,655 Total cost of DTV-12 units $ 1,444,000 $ 2,334,000 Direct labor wage rate per hour $ 68.50 $ 84 The partial operational productivity ratio of DTV-12 in 2022 is: Multiple Choice 3.00 per unit. 0.73 per unit. 0.63 per unit. 3.33 per unit. 1.92 per unit.arrow_forwardSo, if Question 7 Question 8 Question 9 Question content area top Part 1 (Related to Checkpoint 13.3) (Scenario analysis) Family Security is considering introducing tiny GPS trackers that can be inserted in the sole of a child's shoe, which would then allow for the tracking of that child if he or she was ever lost or abducted. The estimates, that might be off by 10 percent (either above or below), associated with this new product are shown here: LOADING... . Since this is a new product line, you are not confident in your estimates and would like to know how well you will fare if your estimates on the items listed above are 10 percent higher or 10 percent lower than expected. Assume that this new product line will require an initial outlay of $1.00 million, with no working capital investment, and will last for 10 years, being depreciated down to zero using straight-line depreciation. In addition, the firm's required rate of return or cost of capital is…arrow_forwardQuestion #4 "The higher the minimum desired rate of return, the higher the price that a company will be willing to pay for cost-saving equipment." Do you agree? Explain. Respond Responses for this topic are hidden from you until you make a response. P Pearson Copyright© 2021 Pearson Education Inc. All rights reserved.I Terms of Use I Privacy Policy I Permissions I Contact Us rch 233 PM ENG 4/20/2021 "brt sc delete home end backspace num lock P. っ] home 4 enter pause ↑ shift end HP Pavilion Powerful laptop. Thin and light design.arrow_forward
- Q4 ChatGPT wwwwwwwwwww i. What can generative AI applications perform? ii. What are the tools for Generative AI? iii. You are required to design a logo for your system of the AIS project based on the following 1. Use ChatGPT or similar tools to generate a prompt that describes the details of the logo 2. Input the prompt into an image generator and generate 4 different versions of the logo.arrow_forwardQUESTION 4 What is the best way to familiarize yourself with the effectiveness, timing, and appropriateness of your research methodology? O pilot testing O read previous research O watch youtube videos to see how long the measurements take O ask an expertarrow_forwardPlease Solve In 15mins I will Thumbs-up promisearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Financial Reporting, Financial Statement Analysis...FinanceISBN:9781285190907Author:James M. Wahlen, Stephen P. Baginski, Mark BradshawPublisher:Cengage Learning

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L

Financial Reporting, Financial Statement Analysis...
Finance
ISBN:9781285190907
Author:James M. Wahlen, Stephen P. Baginski, Mark Bradshaw
Publisher:Cengage Learning